Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Deniable authentication

Known as: Repudiability (cryptography), Repudiation (cryptography) 
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Abstract This paper presents fingerprint biometric-based self-authentication and deniable authentication schemes, which enable a… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this article, we propose a deniable electronic voting authentication protocol for mobile ad hoc networks, which meets the… Expand
  • table 1
  • figure 1
  • figure 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then… Expand
  • figure 1
  • figure 2
Is this relevant?
2005
2005
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… Expand
Is this relevant?
2005
2005
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • Zuhua Shao
  • Comput. Stand. Interfaces
  • 2004
  • Corpus ID: 18768433
Abstract An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the… Expand
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Consider a CIA agent who wants to authenticate herself to a server but does not want to reveal her CIA credentials unless the… Expand
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
When mobile agents do comparison shopping for their owners, they are subject to attacks of malicious hosts executing the agents… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?